the unix operating system
play

The Unix Operating System SE 101 Spiros Mancoridis What is an OS? - PowerPoint PPT Presentation

The Unix Operating System SE 101 Spiros Mancoridis What is an OS? An operating system (OS) is software that manages the resources of a computer Like most managers, the OS aims to manage its resources in a safe and efficient way Examples of


  1. The Unix Operating System SE 101 Spiros Mancoridis

  2. What is an OS? An operating system (OS) is software that manages the resources of a computer Like most managers, the OS aims to manage its resources in a safe and efficient way Examples of computer resources are: CPU, RAM, disk memory, printers, displays, keyboard, mouse, etc The OS also isolates users and application programmers from the underlying computer

  3. Operating Systems Microsoft Windows Unix

  4. OS Architecture Without an OS, every application would have to implement some part of this software hierarchy ...

  5. Unix A popular multi-user, multi-tasking OS Attributes: stability, portability, security Created at Bell Labs by Dennis Ritchie and Ken Thompson (won the ACM Turing Award in 1983) Unix is considered one of the greatest achievements in computer science Has been around since the 1960s in various forms, e.g., AIX, SCO Unix, SunOS, FreeBSD, OpenBSD, NetBSD, Linux, Mac OS X

  6. Unix Multiuser and Multitasking Toolbox philosophy Concise syntax Designed by programmers for programmers

  7. 1983 ACM Turning Award (Unix) ACM is the Association for Computing Machinery World’s largest educational and scientific computer society Thompson and Ritchie You can become a student member too www.acm.org The ACM awards the Turing Award every year. It is the “Nobel Prize” of computing Named after british mathematician Alan M. Turing Alan M. Turing (1912-1954)

  8. Unix Kernel Includes device drivers for computer hardware devices, e.g., graphics cards, network cards, disks A device driver is a program that allows computer programs to interact with hardware devices CPU and memory management File system management Implements system calls that can be used by application programs and system utilities

  9. What’s inside the Box? The von Neumann Architecture The OS hides this complexity from the programmer

  10. Unix Shells and GUIS Shells are used for command line input/output to and from users e.g., sh (Bourne shell), bash (Bourne again shell), csh (C shell), ksh (Korn shell) GUIs are used for graphical I/O e.g., Linux KDE, GNOME, Mac OS Leopard

  11. Unix System Utilities System utilities are specialized software tools (commands) e.g., ls , cp , grep , awk , bc , wc , more , rm , mkdir , ... Daemons provide remote network and administration services e.g., ssh (remote login) lpd (remote printing) httpd (serves web pages)

  12. Unix Application Programs This is the software that users commonly interact with e.g., vi and emacs (text editors) gcc (GNU C compiler) javac (Java compiler) java (Java run time virtual machine system)

  13. What is a programming language? A programming language is an artificial language designed to express computations that will be executed on a computer Programming languages have a syntax (form) and semantics (meaning) Java and C are example programming languages

  14. What is a compiler? A compiler is a computer program that transforms human readable source code of another computer program into machine readable code that a computer can execute. The act of transforming source code into machine code is called compilation . package com.javadb.examples; import java.util.Arrays; import java.util.List; import java.util.Iterator; public class Main { public static void main(String[] args) { String[] array = {"Programming", "is", "cool"}; List<String> list = Arrays.asList(array); Iterator<String> iterator = list.iterator(); while (iterator.hasNext()) { System.out.println(iterator.next()); } } } Java Source Code Java Compilation Process

  15. What is a Virtual Machine? A virtual machine (VM) is a software implementation of a computer that executes programs like a physical computer A system VM implements a complete computer that can support the execution of a real OS (e.g., vmware, KVM) A process VM is designed to run a single program (e.g., Java VM) Improves program portability, i.e., the ability to reuse software on a different platform with little or no modification

  16. Logging into Unix login: <type your user id> password: <type your password> $ pwd /home/spiros $ exit

  17. Logging into Unix userid is the unique name of the user password can be changed password should only be known by user system staff does not know user password, but they have the power to change it Unix is case sensitive

  18. passwords ... do make sure no one is looking while you enter your password change your password often choose a password that you can remember use at least 8 characters (letters) in your password Mix letters (upper and lower case) with digits and punctuation

  19. Passwords ... Don’t use a word that can be found in a dictionary use a name keep your password written on a piece of paper use control characters use personal information (e.g., address, birthday, name of pet) ever give your password to anybody

  20. changing password Use the Unix passwd command You will be prompted for both your current password (once) and your new password (twice) change your initial password immediately

  21. Logging out of unix logout leaves the system exit quits the shell ^D same as logout, but often disabled

  22. Unix Commands $ command -options targets man man (a manual on the Unix manual) There should be a man page for every Unix command e.g., man ls Read the man pages, they are very useful and convenient

  23. Some Unix commands passwd date Try these Unix hostname commands and see who what they do ... last finger The man pages can w give you details on clear how to use these (and cal other) commands bc -l history ssh

  24. Unix Filesystem Ordinary Files Files contain data, program code, etc File names cannot have the ‘/’ character in them Directories Contain files and other directories Links A link is a pointer reference to another file (like an alias) Devices Allows applications to access hardware devices

  25. Unix Filesystem HierArchy

  26. Unix DiRectories / The "root" directory /bin Essential low-level system utilities /usr/bin Higher-level system utilities and application programs /sbin Superuser system utilities (for performing system administration tasks) /lib Program libraries (collections of system calls that can be included in programs by a compiler)for low-level system utilities /usr/lib Program libraries for higher-level user programs /tmp Temporary file storage space (can be used by any user) /home User home directories containing personal file space for each user. Each directory is named after the login of the user. /etc UNIX system configuration and information files /dev Hardware devices /proc A pseudo-filesystem which is used as an interface to the kernel. Includes a sub- directory for each active program (or process).

  27. Useful Unix Filesystem commands $ cd /usr/bin $ pwd /usr/bin $ cd / $ ls bin/ lib/ media/ proc/ selinux/ sys/ var/ boot/ � dev/ homes/ lib32/ mnt/ root/ site/ tmp/ etc/ opt/ sbin/ srv/ usr/ $ man ls

  28. ls -l • An example of the output is of ls -l is: drwxr-xr-x 3 spiros serg 238 May 5 2:05 license.dat ◦ type is a single character which is either 'd' (directory), '-' (ordinary file), 'l' (symbolic link). ◦ permissions is a set of characters describing access rights. There are 9 permission characters, describing 3 access types given to 3 user categories. The three access types are read ('r'), write ('w') and execute ('x'), and the three users categories are the user who owns the file, users in the group that the file belongs to and other users (the general public). An 'r', 'w' or 'x' character means the corresponding permission is present; a '-' means it is absent. ◦ links refers to the number of filesystem links pointing to the file or directory. ◦ owner is the user who created the file or directory. ◦ group denotes a collection of users who are allowed to access the file according to the group access rights specified in the permissions field. ◦ size is the length of a file, or the number of bytes used by the operating system to store the list of files in a directory. ◦ date is the date when the file or directory was last modified. The -u option display the time when the file was last accessed (read). ◦ name is the name of the file or directory.

  29. Useful Unix Filesystem commands cd path (change directory to path ) mkdir directory (make a new directory) rmdir directory (remove a directory) cp source-file destination-file (copy source-file into destination-file) cp source-file(s) destination-directory (copy source files into destination-directory)

  30. useful unix filesystem commands mv source destination (move/rename source file or directory to destination file or directory) rm file(s) (remove/delete files) rm -rf directory (remove entire directory) cat target-file(s) (concatenate target files and display them on the screen) cat target-file(s) > output.txt (store concatenation to output file)

  31. useful unix filesystem commands ln -s filename linkname (create a pointer to filename and call it linkname) cat ?piros (concatenates all files that start with any character and end with piros) cat * (concatenates all files in the current directory) ls [a-c]*[x-z] (lists files that start with a letter from a-c and end with a letter from x-z)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend